CVE-2020-6420
Google Chrome vulnerability analysis and mitigation

Overview

Insufficient policy enforcement in media in Google Chrome prior to version 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page. The vulnerability was assigned CVE-2020-6420 and was discovered on February 11, 2020 (Chrome Blog).

Technical details

The vulnerability received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This indicates that the vulnerability is network exploitable, requires low attack complexity, needs no privileges, but does require user interaction. The potential impact is high across confidentiality, integrity, and availability (NVD).

Impact

The vulnerability could allow an attacker to bypass the same origin policy, which is a critical security control in web browsers. This bypass could potentially lead to unauthorized access to sensitive data across different origins, compromising the fundamental security boundaries between web applications (NVD).

Mitigation and workarounds

The vulnerability was patched in Chrome version 80.0.3987.132. Users and administrators should update to this version or later to mitigate the risk. The fix was released as part of a larger security update that addressed multiple vulnerabilities (Chrome Blog).

Additional resources


SourceThis report was generated using AI

Related Google Chrome vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13230HIGH8.8
  • Google ChromeGoogle Chrome
  • chromium
NoYesNov 18, 2025
CVE-2025-13229HIGH8.8
  • Google ChromeGoogle Chrome
  • cpe:2.3:a:google:chrome
NoYesNov 18, 2025
CVE-2025-13228HIGH8.8
  • Google ChromeGoogle Chrome
  • chromium
NoYesNov 18, 2025
CVE-2025-13227HIGH8.8
  • Google ChromeGoogle Chrome
  • chromium
NoYesNov 18, 2025
CVE-2025-13992MEDIUM4.7
  • Google ChromeGoogle Chrome
  • chromium
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management